OAM DMA hijacking: Difference between revisions
Jump to navigation
Jump to search
Content added Content deleted
No edit summary |
|||
Line 52: | Line 52: | ||
ld a,(FFD3) ; a=random "D-sum" byte 1 number. |
ld a,(FFD3) ; a=random "D-sum" byte 1 number. |
||
ld (FFF8),a ; put a into FFF8, which controls what buttons are being pressed. |
ld (FFF8),a ; put a into FFF8, which controls what buttons are being pressed. |
||
ret ; Don't execute any code after D350. |
|||
This example is a simulation of RNG Plays Pokémon, but the routine at D34A can be adjusted for different inputs into FFF8. |
This example is a simulation of RNG Plays Pokémon, but the routine at D34A can be adjusted for different inputs into FFF8. |